Vulnerability Details CVE-2018-6556
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.1%
CVSS Severity
CVSS v3 Score 3.3
CVSS v2 Score 2.1
Products affected by CVE-2018-6556
-
cpe:2.3:a:linuxcontainers:lxc:2.0.0
-
cpe:2.3:a:linuxcontainers:lxc:2.0.1
-
cpe:2.3:a:linuxcontainers:lxc:2.0.2
-
cpe:2.3:a:linuxcontainers:lxc:2.0.3
-
cpe:2.3:a:linuxcontainers:lxc:2.0.4
-
cpe:2.3:a:linuxcontainers:lxc:2.0.5
-
cpe:2.3:a:linuxcontainers:lxc:2.0.6
-
cpe:2.3:a:linuxcontainers:lxc:2.0.7
-
cpe:2.3:a:linuxcontainers:lxc:2.0.8
-
cpe:2.3:a:linuxcontainers:lxc:2.0.9
-
cpe:2.3:a:linuxcontainers:lxc:3.0.0
-
cpe:2.3:a:linuxcontainers:lxc:3.0.1
-
cpe:2.3:a:suse:caas_platform:1.0
-
cpe:2.3:a:suse:caas_platform:2.0
-
cpe:2.3:a:suse:openstack_cloud:6
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:opensuse:leap:15.0
-
cpe:2.3:o:suse:suse_linux_enterprise_server:11